Five Password Tips for Securing the New WFH Normal | Threatpost
The shift to working from home is pushing system administrators to adjust to a new security normal. This includes new, high-profile challenges, such as the Read More
The shift to working from home is pushing system administrators to adjust to a new security normal. This includes new, high-profile challenges, such as the Read More
A credential-phishing attempt that relies on impersonating Bank of America has emerged in the U.S. this month, with emails that get around secure gateway protections Read More
England’s Premier League is returning this week, with millions of soccer fans around the world looking to stream matches using their online video accounts. Unfortunately, Read More
The role of cybersecurity defenders is usually unfair. They have disadvantages — as they have to continuously build up perimeters that protect their networks and Read More
The InvisiMole threat group has resurfaced in a new campaign, revealing a new toolset and a strategic collaboration with the high-profile Gamaredon advanced persistent threat Read More
Advanced malware, dubbed AcidBox, has been identified by researchers who say a mysterious cybergang used it twice against Russian organizations as far back as 2017. Read More
Qbot, an ever-evolving information-stealing trojan that’s been around since 2008, has reappeared after a hiatus to target customers of U.S. financial institutions. Its latest variant Read More
Attackers are impersonating human resource employees from Collins Aerospace and General Dynamics in a spear-phishing campaign leveraging LinkedIn’s messaging service. Targets are sent phony job Read More
A just-released report on the 2016 Central Intelligence Agency (CIA) data breach, which led to the Vault 7 document dump on WikiLeaks, blames “woefully lax” Read More
Twitter has taken down three separate nation-sponsored influence operations, attributed to the People’s Republic of China (PRC), Russia and Turkey. Collectively the operations consisted of Read More